{"version":"1.0","provider_name":"Solutions Exchange","provider_url":"https:\/\/www.solutions-exchange.fr","author_name":"admin6583","author_url":"https:\/\/www.solutions-exchange.fr\/index.php\/author\/admin6583\/","title":"La s\u00e9curit\u00e9 des postes de travail - Solutions Exchange","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"uHaEqG83fk\"><a href=\"https:\/\/www.solutions-exchange.fr\/index.php\/2024\/06\/14\/la-securite-des-postes-de-travail\/\">La s\u00e9curit\u00e9 des postes de travail<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.solutions-exchange.fr\/index.php\/2024\/06\/14\/la-securite-des-postes-de-travail\/embed\/#?secret=uHaEqG83fk\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0La s\u00e9curit\u00e9 des postes de travail\u00a0\u00bb &#8212; Solutions Exchange\" data-secret=\"uHaEqG83fk\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"La gestion de la s\u00e9curit\u00e9 au niveau des postes de travail est un \u00e9l\u00e9ment fondamental de la strat\u00e9gie globale de s\u00e9curit\u00e9 de toute entreprise Les Consultants Techniques Solutions Exchange ont cr\u00e9\u00e9 une s\u00e9rie de webinaires \u00ab Pourquoi et Comment \u00bb autour des objectifs de la strat\u00e9gie IT et des solutions connexes qui y r\u00e9pondent. Nous [&hellip;]"}